UCF STIG Viewer Logo

Audit log files must be owned by root.


Overview

Finding ID Version Rule ID IA Controls Severity
V-209054 OL6-00-000384 SV-209054r793775_rule Medium
Description
If non-privileged users can write to audit logs, audit trails can be modified or destroyed.
STIG Date
Oracle Linux 6 Security Technical Implementation Guide 2021-12-03

Details

Check Text ( C-9307r357947_chk )
Run the following command to check the owner of the system audit logs:

grep "^log_file" /etc/audit/auditd.conf|sed s/^[^\/]*//|xargs stat -c %U:%n

Audit logs must be owned by root.
If they are not, this is a finding.
Fix Text (F-9307r357948_fix)
Change the owner of the audit log files with the following command:

# chown root [audit_file]